Login / Signup
Efficient Techniques for Comprehensive Protection from Memory Error Exploits.
Sandeep Bhatkar
Daniel C. DuVarney
Published in:
USENIX Security Symposium (2005)
Keyphrases
</>
database
limited memory
neural network
search algorithm
machine learning
social networks
multi agent
expert systems
query processing
model selection
error bounds
computing power